All resources sponsored by:

Veracode, Inc.

1 - 25 of 34 Matches
Top 5 Web and Mobile App Security Challenges
sponsored by Veracode, Inc.
RESOURCE:Access this brief infographic to learn the top five challenges to securing web and mobile applications today. View now to explore an alternative strategy to reduce app-layer risk.
Posted: 26 Feb 2015 | Published: 27 Jan 2015
Get This Now


The Application Testing Gap
sponsored by Veracode, Inc.
RESOURCE:Check out this quick infographic to see the rising cost of application security testing. Explore new ways to reduce spending while protecting all of your apps.
Posted: 26 Feb 2015 | Published: 25 Nov 2014
Get This Now


Case Study: Securing 1000+ Apps from a Centralized Dashboard
sponsored by Veracode, Inc.
CASE STUDY:Access this case study to learn how one banking firm centralized their strategy and automated testing to ensure consistency and reduce costs with a cloud-based security platform.
Posted: 26 Feb 2015 | Published: 04 Dec 2014
Get This Now


Secure Agile Development Guidelines
sponsored by Veracode, Inc.
WHITE PAPER:Access this white paper to learn how to integrate security into the development process.   Read on to learn how to craft your app security strategy for an agile environment.
Posted: 26 Feb 2015 | Published: 03 Nov 2014
Get This Now


Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER:View this white paper to learn how to close application vulnerability gaps and mitigate business risk.  Read on to learn more.
Posted: 26 Feb 2015 | Published: 15 Oct 2014
Get This Now


Evolve to Become the 2018 CISO... Or risk Extinction
sponsored by Veracode, Inc.
WEBCAST:The traditional role of the CISO boasts key characteristics of having technological and security insights, but based on extensive studies from Forrester Research, it has become apparent that these are not the same characteristics you can expect to see from CISOs within the next four years. Find out why by tuning into the following webinar.
Posted: 26 Feb 2015 | Premiered: Feb 26, 2015
Get This Now


App Security: Going Beyond Scanning and Remediation
sponsored by Veracode, Inc.
WHITE PAPER:This white paper outlines one cloud-based app security platform that continuously monitors and assesses business-critical applications to find vulnerabilities earlier.
Posted: 24 Feb 2015 | Published: 09 Jul 2014
Get This Now


The Impact of Data Breaches: Why Application Security is a Business Imperative
sponsored by Veracode, Inc.
WHITE PAPER:64% of internally developed enterprise applications remain untested for security vulnerabilities. View this informative whitepaper now to learn the impact of security breaches, and the hurdles companies must overcome to develop apps with security as a priority.
Posted: 20 Aug 2014 | Published: 20 Aug 2014
Get This Now


Webinar: Why Benchmark Application Security?
sponsored by Veracode, Inc.
TRANSCRIPT:Benchmarking application security transitions development plans from assumptions to factual reality. View this webinar to discover how a software assurance maturity model (SAMM) analysis can provide a benchmark for application security performance, and help build realistic plans for the future.
Posted: 19 Aug 2014 | Published: 19 Aug 2014
Get This Now


Webinar: When is Application Security Done?
sponsored by Veracode, Inc.
TRANSCRIPT:Traditional patchwork approaches to application security does not scale to match these leaps in company needs, resulting in poor security coverage of the application infrastructure. Listen to this webinar to discover the growing needs of modern companies, and which security practices will scale to match what tomorrow holds.
Posted: 19 Aug 2014 | Published: 19 Aug 2014
Get This Now


ROI Case Study: Cloud-Application Security Service
sponsored by Veracode, Inc.
CASE STUDY:A Global 2000 financial services organization previously relied on a traditional on-premises security scanning tool. View this Forrester case study now to see how this financial institution captured 192% ROI and reduced application vulnerabilities by 60% with a cloud-based security system.
Posted: 19 Aug 2014 | Published: 19 Aug 2014
Get This Now


Case Study: Global 100 Manufacturer Reduces Risk Across 30,000 Domains in Eight Days
sponsored by Veracode, Inc.
CASE STUDY:A Global 100 manufacturer has thousands of applications that require continuous security assessments, relying on a legacy program that strained under the volume. View this case study now to see how this manufacturer reduced vulnerabilities by 79% in 8 months, and examined 30,000 domain names and IP addresses immediately.
Posted: 18 Aug 2014 | Published: 18 Aug 2014
Get This Now


Case Study: How a Global Bank Addressed App Security and Lowered Costs
sponsored by Veracode, Inc.
CASE STUDY:A global leader of major banks mandated a new top-down approach to reduce application-layer risk throughout its global software infrastructure. View this case study to see how a security solution helped this bank assess their security needs and reduce the opportunity for exploitation.
Posted: 14 Aug 2014 | Published: 14 Aug 2014
Get This Now


Magic Quadrant for Application Security Testing
sponsored by Veracode, Inc.
ANALYST REPORT:Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.
Posted: 03 Jul 2014 | Published: 02 Jul 2013
Get This Now


Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST:In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012
Get This Now


Top 10 Mobile Application Risks
sponsored by Veracode, Inc.
WEBCAST:In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.
Posted: 11 May 2012 | Premiered: May 11, 2012
Get This Now


Understanding the risks of mobile apps
sponsored by Veracode, Inc.
WHITE PAPER:Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Posted: 11 May 2012 | Published: 11 May 2012
Get This Now


Expert guide to understanding SaaS and cloud computing issues
sponsored by Veracode, Inc.
EGUIDE:This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
Get This Now


State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER:Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011
Get This Now


Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST:Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011
Get This Now


Dirty Little Secrets: Mobile Apps Invading Your Privacy
sponsored by Veracode, Inc.
WEBCAST:Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011
Get This Now


State of Software Security Report
sponsored by Veracode, Inc.
WHITE PAPER:The State of Software Security is a semi-annual report that draws on continuously updated information in Veracode’s cloud-based application risk management services platform. Unlike a survey, the data comes from actual code-level analysis of billions of lines of code and thousands of applications.
Posted: 28 Feb 2011 | Published: 28 Feb 2011
Get This Now


Eradicate Cross-Site Scripting
sponsored by Veracode, Inc.
WHITE PAPER:The rise of e-commerce has generated a concurrent surge of Internet crime into a multi-billion-a-year industry, as criminals follow the money, the countless potential online victims and the vulnerability of web applications to easy exploitation.
Posted: 28 Feb 2011 | Published: 28 Feb 2011
Get This Now


Barclays Application Security Assurance Project
sponsored by Veracode, Inc.
CASE STUDY:As threats within the corporate information security landscape intensify, this award is geared to recognizing excellence in IT security projects within the financial sector.
Posted: 17 Feb 2011 | Published: 17 Feb 2011
Get This Now


Magic Quadrant for Static Application Security Testing
sponsored by Veracode, Inc.
WHITE PAPER:In this research, we analyze the evolution of the static application security testing market, and evaluate its vendors according to their business and technology vision, as well as their ability to execute against that vision in their products and services.
Posted: 17 Feb 2011 | Published: 17 Feb 2011
Get This Now


1 - 25 of 34 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement